Jay Stanley Senior Policy Analyst Speech, Privacy and Technology Program Editor, Free Future blog 202-715-0818 The Future of Our Privacy.

Slides:



Advertisements
Similar presentations
1 Marketing Violent Entertainment to Children The FTC’s Reports on Self-Regulation and Industry Practices in the Motion Picture, Music Recording & Electronic.
Advertisements

Building an on-line presence that makes it easy for customers to find your service company.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Penn State Graphic Standards: Why Are They Important on the Web? Jeff Hermann University Editor and Director of University Publications.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The Role of Computers in Surveillance ~ Katie Hatland.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Location-Based Services: Time for a Privacy Check-In Nicole A. Ozer, Esq. Technology and Civil Liberties Policy Director ACLU of Northern California dotrights.org/LBS.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
1. An Idea “In order to create wealth, you must be the first with an idea. Then, you must be first to tell the world about that idea” Warren Buffett “…probably.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
FINAL PROJECT Shelby LeVasseur CSC Fall 2012 November 27 th, December 13 th, 2012.
Current Best Practices and Precedents Existing UAV Guidelines/Best Practices.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Make It Easy For e-Buyers to Contact You Toll-free phone numbers Call centers Text messaging Instant chat 1.
Christine Laham, Fahed Abdu, David Dezano,Shelly Kim.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Internet Skills The World Wide Web (Web) consists of billions of interconnected pages of information from a wide variety of sources. In this section: Web.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Chapter 7 Impact of Information Technology. Agenda Shneiderman’s Plagues of the Information era Ethics Issues Corporate Code of IT Ethics Other Impacts.
+ Big Data IST210 Class Lecture. + Big Data Summary by EMC Corporation ( More videos that.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Understanding Business and Personal Law Consumer Protection Section 15.1 Consumer Protection and Product Liability Years ago, caveat emptor, which means.
From World IPv6 Day to World IPv6 Launch: This time it’s for real Andrei Robachevsky
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
How Much Privacy Can We Really Expect? Terence Craig & Mary Ludloff, Co-Authors.
The Disclosure and Barring Service Taxi and PHV licensing conference Thursday 19 March 2015 Presented by:Ian Johnston - Director for Operations (Disclosure)
SEOSPELL SEOSPELL offers innovative SEO services to website owners in Manchester. They realize that without internet traffic a website has no meaning.
Global Video Surveillance System Market with Focus on Equipments: ( ) Global Video Surveillance System Market with Focus on Equipments: ( )
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Deep Packet Inspection. Definition Uses Privacy Concerns Neutrality Concerns.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
IT’S RELEVANCE TODAY BILL OF RIGHTS (AND CONSTITUTION)
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Privacy and the Law.
Data Minimization Framework
North Carolina Law Review Symposium
A Gift of Fire Third edition Sara Baase
Artificial Intelligence Changes the Security Landscape
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
A New Technology for Video Surveillance Cameron Serles
От Всемирного Дня к Всемирному Запуску IPv6. В этот раз по-настоящему
Introduction to Health Privacy
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
A Gift of Fire Third edition Sara Baase
Privacy and Data Mining
Baltimore Police Department & CitiWatch
The Trucking Industry.
Presentation transcript:

Jay Stanley Senior Policy Analyst Speech, Privacy and Technology Program Editor, Free Future blog The Future of Our Privacy

I. THE CHALLENGE TO OUR PRIVACY

The challenge to our privacy: Technology revolution A burgeoning security establishment Profit Motives

The challenge to our privacy: Technology revolution A burgeoning security establishment Profit Motives

Change at light speed

“Disruptive technologies”

Smart grid

DNA

Video surveillance

Video Surveillance: a new era

Face recognition

Iris recognition

Behavioral analytics

License plate recognition

Location-tracking

The ultimate in location tracking:

Drones

Advanced imaging technologies

The Ultimate Example: Total Information Awareness

NYC/Microsoft “Domain Awareness System”

Meanwhile: Moore’s Law Charts: Zoomer Magazine, Computer Measurement Group

The Future of Moore’s Law Intel Core i Processor: $ on Newegg

The Future of Moore’s Law Today: $294.99

The Future of Moore’s Law Today: $ In 20 years: $0.03

The Future of Moore’s Law

Also following Moore’s Law 20 years: 1,000-32,000x today’s power

Faster, cheaper – and smarter

Hans Moravec: 2020s

In whose interest?

How will AI be used?

Are we ready for all this?

The challenge to our privacy: Technology revolution A burgeoning security establishment

The Security State NSA: 30,000 employees CIA: 20,000 employees Others: many more Overall IC: at least $57 billion Oversight? Not much. FBI: 33,000

Swinging the telescope inward

FISA Amendments Act of 2008  General Warrants. No specificity required. (All US- London traffic?)  Little judicial oversight. FISA court only reviews the government’s “targeting” and “minimization.” No role overseeing actual use of surveillance power.  No limits on use of data. Huge databases, stored forever, shared with anyone, re-used for any purpose.  Domestic s included. Location uncertain? Go ahead!  Immunity for lawbreakers. Don’t try this at home!

Cybersecurity

The challenge to our privacy: Technology revolution A burgeoning security establishment Profit Motives

Internet advertising

Data brokers & “big data”

An emerging surveillance- industrial complex  Recruiting or pressing private companies into service  Lobbying by companies for more surveillance  Partnerships with data companies

Many options for accessing private data 1.Ask for data to be shared voluntarily 2.Simply buy information 3.Demand it using legal powers 4.“Bake in” surveillance 5.Create regularized systems for standing access to records of private activities

Are we ready for all this?

Jurisprudence off-track Reasonable expectation” standard Third-party doctrine

Arbitrary situation

Congress isn’t keeping up either: Just a few things have changed since ECPA drafted in 1986 … 1990: World Wide Web created 1994: Yahoo & Amazon founded 1998: Google founded 2004: Facebook launched

Lifecycle of an Unopened > 180 days < 180 daysWarrant Subpoena or 2703(d) with notice Opened Header info Basic subscriber info (name, address, connection records, etc) Subpoena or 2703(d) NO notice req’d

And was one of the specific technologies that existed in 1986! What about…  Search  Location-based services  Cloud Computing

FISA Amendments Act

How this plays forward 1.Behavior changes

Human are social animals Constantly monitoring, finely aware of how we’re perceived by those around us

That means privacy gaps rarely last

Lag time in privacy awareness

Chilling Effects: The Facebook “blandification” effect

Chilling effects can also be spurred by many technologies Surveillance cameras Government eavesdropping Offline data collection

How this plays forward 1.Behavior changes

How this plays forward 1.Behavior changes 2.Law/practice changes

Where we just find invasions intolerable and change the world to end them ECPA reform Commercial privacy regulation Drone regulation

ACLU in the courts NSA spying

ACLU in the courts National Security Letters

ACLU in the courts Cell phone location data

ACLU in the courts Laptops at the border

How this plays forward 1.Behavior changes 2.Law/practice changes

How this plays forward 1.Behavior changes 2.Law/practice changes 3.Expectations change

Public-private boundary The home Campaign donations Real estate transactions Professional confidences Marriage Arrests Video rental records License Plates

Public-private boundary The home Campaign donations Real estate transactions Professional confidences Marriage Arrests Video rental records License Plates

Public-private boundary The home Campaign donations Real estate transactions Professional confidences Marriage Arrests Video rental records License Plates

How this plays forward 1.Behavior changes 2.Law/practice changes 3.Expectations change

How this plays forward 1.Behavior changes 2.Law/practice changes 3.Expectations change 4. Things just get worse

III. WHAT MUST BE DONE?

What Must Be Done? 1. Enact comprehensive privacy laws

What Must Be Done? 2. Enact technology-specific privacy laws

What Must Be Done? 3. Create institutions to enforce privacy laws

What Must Be Done? 4. Revive the 4 th Amendment

Jay Stanley Speech, Privacy and Technology Program Free Future blog: Contact info:

asdf ASDF

asdf